With 465,000 cybersecurity job openings in the United States, why is recruiting so difficult? A recent college graduate offers his take.
Read moreAt least two government-backed actors -- including one Russian group -- used the now-patched flaws in separate campaigns, Google says.
Read moreThe Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.
Read moreStopRansomware.gov provides information to help organizations protect against, and respond to, ransomware attacks.
Read moreCandiru sold spyware that exploited Windows vulnerabilities and had been used in attacks against dissidents, activists, and journalists.
Read moreGafgyt and Mirai malware represented majority of IoT malware, new data from Zscaler shows.
Read moreHow to Bridge On-Premises and Cloud Identity
July 15 2021Identity fabric, a cloud-native framework, removes the need for multiple, siloed, proprietary identity systems.
Read more"It was 20 years ago today..." that we learned a few lessons that are well worth revisiting!
Read moreWhat to Look for in an Effective Threat Hunter
July 15 2021The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
Read moreColorado Passes Consumer Privacy Law
July 15 2021First California. Then Virginia. Now Colorado. Here’s a good comparison of the three states’ laws.
Read more
Recent Comments